Log in to ask questions, share your expertise, or stay connected to content you value. Don’t have a login? Learn how to become a member.
See matching posts in thread - #FeatureFridays #WANAssurance #Marvis #Mist #Con...
See matching posts in thread - Reduce Troubleshooting Time You can use Marvis a...
The other session showed how deep neural networks can be used to mount a targeted attack where both the intended victim’s identity and the malicious payload are hidden within the ML models and are impossible to extricate by reverse engineering
2 Comments - agreed. Supervised ML models for security are as good as data fed in and the expertise of the model trainer
Introduction The fifth-generation ASICs in the Express family are addressing growing traffic demand seen in service provider and cloud provider deployments – in the aggregation networks, backbones, at the peering sites, data centers, and AI/ML training clusters
Solving the low entropy problem of the AI/ML training workloads in the Ethernet Fabrics
Based on the Express 5 Packet Forwarding Engine, it is designed to be deployed for multiple applications such as core, peering, CDN gateways, DCI, DC edge, aggregation, and datacenter, including AI/ML clusters. This very high-performance router offers an impressive density of 800Gbps ports, as well as a range of advanced features that make it ideal for a variety of applications
Inability to understand the inner workings of ML algorithms can lead to picking the wrong algorithm for a problem
It has been a hot research topic for over a decade. With modern AI/ML workloads, there is increased momentum in the past few years to get these devices in the hands of the users